TY - GEN
T1 - Towards a science for adaptive defense
T2 - 2nd IEEE International Conference on Collaboration and Internet Computing, IEEE CIC 2016
AU - Hu, Zhisheng
AU - Chen, Ping
AU - Lu, Yang
AU - Zhu, Minghui
AU - Liu, Peng
N1 - Publisher Copyright:
© 2016 IEEE.
PY - 2017/1/6
Y1 - 2017/1/6
N2 - Suffering from the big "hit" by the Heartbleed attack, the society has learned one hard lesson, namely, the severity of zero-day continuous buffer over-read attacks. According to a survey on Heartbleed, 24-55% of HTTPS servers in the Alexa Top 1 Million were initially vulnerable to Heartbleed, including 44 of the Alexa Top 100. The Heartbleed attack is continuous buffer over-read: it usually lasts several hours, involving hundreds of thousands of probing (buffer over-read) requests. In most cases, a short period of time is insufficient for the attacker to achieve his/her goal. This paper presents our recent work on the development of adaptive defense systems which can practically defend against zero-day continuous buffer overread attacks; i.e., Heartbleed-like attacks and data structure manipulation attacks, and meanwhile whose cost-effectiveness is mathematically provable.
AB - Suffering from the big "hit" by the Heartbleed attack, the society has learned one hard lesson, namely, the severity of zero-day continuous buffer over-read attacks. According to a survey on Heartbleed, 24-55% of HTTPS servers in the Alexa Top 1 Million were initially vulnerable to Heartbleed, including 44 of the Alexa Top 100. The Heartbleed attack is continuous buffer over-read: it usually lasts several hours, involving hundreds of thousands of probing (buffer over-read) requests. In most cases, a short period of time is insufficient for the attacker to achieve his/her goal. This paper presents our recent work on the development of adaptive defense systems which can practically defend against zero-day continuous buffer overread attacks; i.e., Heartbleed-like attacks and data structure manipulation attacks, and meanwhile whose cost-effectiveness is mathematically provable.
UR - http://www.scopus.com/inward/record.url?scp=85013141215&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85013141215&partnerID=8YFLogxK
U2 - 10.1109/CIC.2016.25
DO - 10.1109/CIC.2016.25
M3 - Conference contribution
AN - SCOPUS:85013141215
T3 - Proceedings - 2016 IEEE 2nd International Conference on Collaboration and Internet Computing, IEEE CIC 2016
SP - 112
EP - 121
BT - Proceedings - 2016 IEEE 2nd International Conference on Collaboration and Internet Computing, IEEE CIC 2016
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 1 November 2016 through 3 November 2016
ER -